Lucene search

K
osvGoogleOSV:GHSA-F4MM-2R69-MG5F
HistoryOct 25, 2022 - 8:21 p.m.

OpenFGA Authorization Bypass

2022-10-2520:21:33
Google
osv.dev
11
openfga
security assessment
authorization bypass
version v0.2.3
vulnerability
tupleset relations
upgrade
backward compatibility

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.4%

Overview

During our internal security assessment, it was discovered that OpenFGA versions v0.2.3 and prior are vulnerable to authorization bypass under certain conditions.

Am I Affected?

You are affected by this vulnerability if you are using openfga/openfga version v0.2.3 or prior, and your model has a relation defined as a tupleset (the right hand side of a β€˜from’ statement) that involves anything other than a direct relationship (e.g. β€˜as self’)

How to fix that?

Upgrade to version v0.2.4.

Backward Compatibility

This update is not backward compatible.
Any model involving rewritten tupleset relations will no longer be acceptable and has to be modified.

CPENameOperatorVersion
github.com/openfga/openfgalt0.2.4

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.4%

Related for OSV:GHSA-F4MM-2R69-MG5F